Whalers Blog

  • Blog
  • About
  • Admin
  • Categories
  • Contact
    • X
    • Telegram
    • Mastodon
    • Bluesky
  • June 26, 2025

    Apple Ecosystem: Overlooked Devices

    When it comes to digital evidence, most investigators naturally focus on smartphones – and occasionally tablets. But the rest of the Apple ecosystem often goes unnoticed: Apple Watch, Apple TV, HomePod, even older iPod Touch models. These supplementary devices might seem irrelevant, but they can contain valuable digital artifacts: activity logs, Wi‑Fi credentials, leftover bits and…

    Apple ecosystem, EIFT, iOS, Mobile, Tips & Tricks
  • June 26, 2025

    What to Do With an Old MacBook: 9 Smart Ways to Reuse Your Mac

    If you’ve got an old Mac, you might be able to repurpose it to make it useful again. Here are several ideas on how you can put your old Macs to good use. The post What to Do With an Old MacBook: 9 Smart Ways to Reuse Your Mac appeared first on The Mac Security…

    Cybersecurity, Cybersecurity awareness, eBay, How To, Linux, Mac OS 9, Security, Security Awareness, Server
  • June 26, 2025

    What to Do If Your Mac Was Hacked

    Does your beloved Mac suddenly act strangely? Do you keep getting pop-ups everywhere, or does your webcam light suddenly turn on by itself? Do you find that your Mac is overheating constantly, and its fans are running wild? These are just some of the more common issues that may indicate a problem and make you…

    Cybersecurity, Cybersecurity awareness, How To, malware, Security, Security & Privacy, Security Awareness
  • June 26, 2025

    Europol Warns of Social Engineering Attacks

    Social engineering remains a primary initial access vector for cybercriminals, according to a new report from Europol. Go to Source

    Cybersecurity, Cybersecurity awareness, malware, Phishing, Security, Security Awareness, social engineering
  • June 26, 2025

    CyberheistNews Vol 15 #25 Microsoft & KnowBe4 Collab: Strengthen Email Security Through Strategic Integration

    Go to Source

    CyberCrime, Cybersecurity, Cybersecurity awareness, KnowBe4, Security, Security Awareness
  • June 26, 2025

    A Clicking Time Bomb: What To Do About Repeat Clickers

    I recently had several conversations about repeat clickers. First with a Forrester analyst and then, shortly after, at KB4-CON Orlando following a presentation on the subject by Matthew Canham, Executive Director of the Cognitive Security Institute. Go to Source

    Cybersecurity, Cybersecurity awareness, Phishing, Security, Security Awareness, Security Culture
  • June 26, 2025

    FTC States That Scams Cost U.S. Consumers $158.3 Billion in One Year

    I am used to repeating some pretty big numbers when talking about the financial impact of cybercrimes. When you look into the data, it is pretty easy to start talking about tens of billions of dollars. Go to Source

    Cybersecurity, Cybersecurity awareness, Phishing, Security, Security Awareness, Security Culture
  • June 26, 2025

    Happy 2nd Birthday to Our KnowBe4 Community!

    Can it be? Is it true? Two years of KnowBe4 Community! Go to Source

    Cybersecurity, Cybersecurity awareness, Security, Security Awareness, Security Culture
  • June 26, 2025

    Warning: Voice Deepfakes Continue to Improve

    AI-generated voice deepfakes present an urgent threat to organizations, according to researchers at Pindrop. Go to Source

    Cybersecurity, Cybersecurity awareness, Security, Security Awareness, Security Culture, social engineering
  • June 26, 2025

    Phishing Deep Dive: EU-Affiliated Survey Platform Exploited in Sophisticated Credential Harvesting Campaign

    Lead Researchers: James Dyer and Louis Tiley Between May 5 and May 7, 2025, KnowBe4 Threat Lab identified a phishing campaign originating from accounts created on the legitimate service ‘EUSurvey’. Although this was a focused campaign, on a smaller-scale to others identified by the team, it employed a combination of sophisticated techniques worth highlighting. Go…

    Cybersecurity, Cybersecurity awareness, KnowBe4 Threat Lab, Phishing, Security, Security Awareness, social engineering
Previous Page
1 … 9 10 11 12 13 … 95
Next Page

Designed by Alireza Gharib